Radha Poovendran
Orcid: 0000-0003-0269-8097Affiliations:
- University of Washington, Department of Electrical and Computer Engineering, Seattle, WA, USA
According to our database1,
Radha Poovendran
authored at least 270 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2015, "For contributions to security in cyber-physical systems".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
RL-ARNE: A Reinforcement Learning Algorithm for Computing Average Reward Nash Equilibrium of Nonzero-Sum Stochastic Games.
IEEE Trans. Autom. Control., November, 2024
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach.
IEEE Trans. Autom. Control., October, 2024
Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats.
Autom., January, 2024
Modeling and Designing Non-Pharmaceutical Interventions in Epidemics: A Submodular Approach.
IEEE Control. Syst. Lett., 2024
CoRR, 2024
Magpie: Alignment Data Synthesis from Scratch by Prompting Aligned LLMs with Nothing.
CoRR, 2024
CoRR, 2024
Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization.
CoRR, 2024
CoRR, 2024
ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024
Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Who is Responsible? Explaining Safety Violations in Multi-Agent Cyber-Physical Systems.
Proceedings of the International Conference on Assured Autonomy, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the American Control Conference, 2024
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2023
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint.
ACM Trans. Cyber Phys. Syst., July, 2023
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems.
IEEE Trans. Ind. Informatics, June, 2023
A Natural Language Processing Approach for Instruction Set Architecture Identification.
IEEE Trans. Inf. Forensics Secur., 2023
Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments.
Games, 2023
CoRR, 2023
A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees.
CoRR, 2023
CoRR, 2023
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Learning Dissemination Strategies for External Sources in Opinion Dynamic Models with Cognitive Biases.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023
Necessary and Sufficient Conditions for Satisfying Linear Temporal Logic Constraints Using Control Barrier Certificates.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023
A Submodular Energy Function Approach to Controlled Islanding with Provable Stability.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Cognitive Bias-Aware Dissemination Strategies for Opinion Dynamics with External Information Sources.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
CoRR, 2022
Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems.
CoRR, 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning.
CoRR, 2022
Comput. Networks, 2022
A Hybrid Submodular Optimization Approach to Controlled Islanding with Heterogeneous Loads.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022
A Submodular Optimization Approach to Stable and Minimally Disruptive Controlled Islanding in Power Systems.
Proceedings of the American Control Conference, 2022
2021
IEEE Trans. Autom. Control., 2021
Adaptive Learning in Two-Player Stackelberg Games with Application to Network Security.
CoRR, 2021
Proceedings of the NeurIPS 2022 Competition Track, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021
2020
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats.
IEEE Trans. Autom. Control., 2020
A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
CoRR, 2020
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020
Proceedings of the 59th IEEE Conference on Decision and Control, 2020
Proceedings of the 59th IEEE Conference on Decision and Control, 2020
Proceedings of the 59th IEEE Conference on Decision and Control, 2020
FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020
2019
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Autom. Control., 2019
IEEE Trans. Autom. Control., 2019
CoRR, 2019
Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks.
CoRR, 2019
TACAN: transmitter authentication through covert channels in controller area networks.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.
Proceedings of the 2019 American Control Conference, 2019
Proceedings of the 2019 American Control Conference, 2019
2018
IEEE Trans. Control. Netw. Syst., 2018
IEEE Trans. Control. Netw. Syst., 2018
A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats.
CoRR, 2018
Maximizing the smallest eigenvalue of a symmetric matrix: A submodular optimization approach.
Autom., 2018
Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018
Proceedings of the 57th IEEE Conference on Decision and Control, 2018
Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
Proceedings of the 2018 Annual American Control Conference, 2018
2017
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Cogn. Commun. Netw., 2017
Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.
IEEE Trans. Autom. Control., 2017
Input Selection for Performance and Controllability of Structured Linear Descriptor Systems.
SIAM J. Control. Optim., 2017
CoRR, 2017
Detecting LTE-U duty cycling misbehavior for fair sharing with Wi-Fi in shared bands.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017
Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017
A submodular optimization approach to leader-follower consensus in networks with negative edges.
Proceedings of the 2017 American Control Conference, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016
Distributed adaptive patching strategies against malware propagation: A passivity approach.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016
2015
IEEE J. Sel. Top. Signal Process., 2015
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Incentivizing crowdsourcing for radio environment mapping with statistical interpolation.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 54th IEEE Conference on Decision and Control, 2015
Proceedings of the 54th IEEE Conference on Decision and Control, 2015
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Proceedings of the 10th ACM Symposium on Information, 2015
Passivity framework for composition and mitigation of multi-virus propagation in networked systems.
Proceedings of the American Control Conference, 2015
Proceedings of the American Control Conference, 2015
2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Mob. Comput., 2014
IEEE Trans. Computers, 2014
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems.
IEEE Trans. Autom. Control., 2014
A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems.
IEEE Trans. Autom. Control., 2014
Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.
IEEE Trans. Autom. Control., 2014
Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework.
CoRR, 2014
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014
Passivity framework for modeling, mitigating, and composing attacks on networked systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014
2013
IEEE Trans. Mob. Comput., 2013
Proc. IEEE, 2013
Pervasive Mob. Comput., 2013
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 4th international ACM Sigsoft symposium on Architecting critical systems, 2013
Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach.
Proceedings of the Control of Cyber-Physical Systems, 2013
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013
Proceedings of the American Control Conference, 2013
Proceedings of the American Control Conference, 2013
2012
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
IEEE Trans. Parallel Distributed Syst., 2012
SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks
CoRR, 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012
Proceedings of the Infotech@Aerospace 2012, 2012
Optimized flow allocation for anonymous communication in multipath wireless networks.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
Proceedings of the 50th Annual Allerton Conference on Communication, 2012
Proceedings of the 50th Annual Allerton Conference on Communication, 2012
2011
Jamming-aware traffic allocation for multiple-path routing using portfolio selection.
IEEE/ACM Trans. Netw., 2011
Proc. IEEE, 2011
J. Comput. Secur., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Resource-efficient and reliable long term wireless monitoring of the photoplethysmographic signal.
Proceedings of Wireless Health 2011, 2011
Proceedings of Wireless Health 2011, 2011
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Security and privacy of future aircraft wireless communications with offboard systems.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011
A submodular optimization framework for leader selection in linear multi-agent systems.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011
GeM-REM: Generative Model-Driven Resource Efficient ECG Monitoring in Body Sensor Networks.
Proceedings of the International Conference on Body Sensor Networks, 2011
2010
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010
IEEE Trans. Circuits Syst. Video Technol., 2010
Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View].
Proc. IEEE, 2010
The power of primes: security of authentication based on a universal hash-function family.
J. Math. Cryptol., 2010
Comput. Commun., 2010
Evaluation of body sensor network platforms: a design space and benchmarking analysis.
Proceedings of Wireless Health 2010, 2010
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 49th IEEE Conference on Decision and Control, 2010
Proceedings of the International Conference on Body Sensor Networks, 2010
2009
Detection of mobile targets on the plane and in space using heterogeneous sensor networks.
Wirel. Networks, 2009
ACM Trans. Sens. Networks, 2009
IEEE Trans. Mob. Comput., 2009
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
IEEE Trans. Dependable Secur. Comput., 2009
Tradeoffs between jamming resilience and communication efficiency in key establishment.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009
J. Univers. Comput. Sci., 2009
A coding-theoretic approach for efficient message verification over insecure channels.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Unconditionally Secure Authenticated Encryption with Shorter Keys.
Proceedings of the Security in Information Systems, 2009
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
2008
Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance.
IEEE Trans. Circuits Syst. Video Technol., 2008
Proc. IEEE, 2008
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the NTMS 2008, 2008
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the Public Key Infrastructure, 2008
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks.
Wirel. Networks, 2007
Wirel. Networks, 2007
A canonical seed assignment model for key predistribution in wireless sensor networks.
ACM Trans. Sens. Networks, 2007
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach.
IEEE/ACM Trans. Netw., 2007
Ad Hoc Networks, 2007
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety.
Proceedings of the Computer Safety, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the Information Security and Cryptology, 2007
2006
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE).
RFC, August, 2006
ACM Trans. Sens. Networks, 2006
IEEE Trans. Inf. Theory, 2006
IEEE J. Sel. Areas Commun., 2006
Comput. Secur., 2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006
2005
ACM Trans. Sens. Networks, 2005
Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks.
Mob. Networks Appl., 2005
Minimizing center key storage in hybrid one-way function based group key management with communication constraints.
Inf. Process. Lett., 2005
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004
Cross-layer design for energy-efficient secure multicast communications in ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
IEEE Trans. Multim., 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of IEEE International Conference on Communications, 2003
Energy-aware secure multicast communication in ad-hoc networks using geographic location information.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
Proceedings of the Global Telecommunications Conference, 2003
2002
Design of secure multicast key management schemes with communication budget constraint.
IEEE Commun. Lett., 2002
2001
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes.
IEEE Trans. Inf. Theory, 2001
Dynamic key distribution scheme using data embedding for secure multimedia multicast.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the IEEE International Conference on Acoustics, 2001
2000
Proceedings of the 14th International Parallel & Distributed Processing Symposium (IPDPS'00), 2000
1999
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
Proceedings of the Advances in Cryptology, 1999